Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2009/01/29/5 | mailing list |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513456 | exploit |
http://www.securityfocus.com/bid/33516 | vdb entry |